| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | Data from Local System |
Wevtutil can be used to export events from a specific log.[1][2] |
|
| Enterprise | T1685 | .001 | Disable or Modify Tools: Disable or Modify Windows Event Log |
Wevtutil can be used to disable specific event logs on the system.[1] |
| .005 | Disable or Modify Tools: Clear Windows Event Logs |
Wevtutil can be used to clear system and security event logs from the system.[1][3] |
||
| ID | Name | References |
|---|---|---|
| G0007 | APT28 | |
| G0143 | Aquatic Panda |
Aquatic Panda uses Wevtutil to extract Windows security event log data from victim machines.[4] |
| G1017 | Volt Typhoon | |
| G1040 | Play | |
| G0129 | Mustang Panda |
Mustang Panda has leveraged Wevtutil to gather information about usernames and Windows Security Event logs.[8] |
| G1054 | MirrorFace |
| ID | Name | Description |
|---|---|---|
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used Wevtutil to delete system and security event logs with |